Feeds

Workers revolt at Time

Company rejects grievances

  • alert
  • submit to reddit

Time Computers has strongly rejected a list of grievances made by a group of call centre staff critical of the company's pay and working conditions.

In an email outlining their workplace gripes the group - which calls itself "The 'Independent' Time Employee Forum" - is demanding increased wages and an end to working practises it says makes staff "answer calls repeatedly like robots".

The disgruntled employees claim they are made to spend too much time working at their computer terminals and say they suffer from high levels of workplace stress.

In an email to Time bosses and copied to the media, the group said: "We simply ask for an overdue higher pay for our hard working underpaid people who work as Customer Care and Technical Support Advisors, we ask for better treatment as human beings."

Time rejected the complaints claiming that the email has been circulated by just two or three employees and did not represent the views of a majority of staff.

"We are looking into it but we don't think there are any grounds for their complaints," said a spokesman.

Time employs 800 people in its customers care department and regularly holds meetings with staff to address workplace issues. ®

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.